Syllabus Detail

  • Methods used to ensure the security of networks; firewalls, anti-virus software, password and network user policies,authentication, encryption. 12 ATAR


  • Is software that inspects incoming data for malware (dangerous files).
  • Can be a server that filters incoming data from blacklisted IP addresses
  • Can be a proxy server, the gatekeeper for what packets of data get in or out
  • Can be software on your computer to protect who accesses your computer
  • Can ban certain protocols, eg File Transfer Protocol (FTP) which can upload dangerous files to computers

Anti-virus Software

  • Is software used to protect your computer.
  • It protects from spyware, worms, trojans, keyloggers and more.
  • It reads files that come into your computer from the internet and if it recognises it as a virus, it will stop the file.
  • Depending on how your anti-virus is setup, it could delete the file, or place it into quarantine.
  • It is most important to update your anti-virus software with updates regularly, to stop new found viruses.

Password and Network User Policies

  • A password is a previously setup comparison of your password on record, to the the one you type in to login.
  • If it matches, you can login. If it doesn't match, you can't.
  • A network user policy outlines how the network can be used by people.
  • Usually students in a school will need to sign agreeing to the school network user policy.


  • This is proving you are really you, to gain access to a network.
  • All people on a network are given a user ID. Common ones are firstname.lastname
  • At registration, you create a password that can later be used to login.
  • Two factor authentication is available which can send a text message with a given number, which you need to type into the given text box. The two factors are firstly your password and secondly the number sent to a mobile or cell phone.


  • Is a way to protect plain text data from being read.
  • It is coded (now cyper-text), sent, then decoded, but only a person who has the correct key can decode it.
  • Here is what a sentence in cypher-text looks like...
  • 6XAtp6n3AOrzS367t1tAITAzIdar6h3IpXqofo0rv2x1y3DzS367t1tAITAzIdar6h3IpXqoTzARK33mML3yHlArXvAXy6acaxjyliAxMCHCfR31VzlAipX4HFMVN3XZixDAx4AcmBHnnJozJYoPahaXYx3P1S11TAADaLlKVO5bXyBhAPQ36Z4jd3AdnH3kR3KB3HoCc30hMTIhTzyYriAxMCAI64A
  • Encryption Type 1 - Private Key - Encryption and decryption key are the same.
  • Encryption - Type 2 - Public Key /Private Key - encryption or public key is available for anyone. But only the receiver can get the decryption key.
  • More from wikipedia


Found an error or have an enhancement? Please let us know via this contact form